- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
- Security Feed
- IT Sicherheit
- IT Blog
- Bautagebuch
- Datenschutz
- Fernwartung
Incomplete comparison with missing factors in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.
Insertion of sensitive information into log file in Windows ETL Channel allows an authorized attacker to disclose information locally.
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.
Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
Use after free in Windows Kernel allows an unauthorized attacker to elevate privileges locally.
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.